I was invited to speak at Go Hacking, a Brazilian cyber security community and training provider. If you have never heard of them, check out the great content on their YouTube page. Given their recent training on Command and Control, I did a talk and demonstration on performing a high-value adversary emulation. I used MITRE ATT&CK for obtaining Cyber Threat Intelligence on APT19. Then I leveraged VECTR to create an adversary emulation plan. Lastly, I used Empire3 with Starkiller, a free command and control framework, and then SCYTHE, an enterprise grade command and control framework to perform the adversary emulation.
Credential Guard + VMware + Windows 10 Vmware Workstation 15.5.5 now has support for Credential Guard enabled on the latest Windows 10 (Windows 10 20H1 build 19041.264 or newer)! This is big news for enterprises and individual users given the security controls we had to disable to be able to run virtual machines on our […]
New website, who dis? Welcome to my new website! I hope to use this site much more than in the previous 10 years as I am now in a new, innovative, and community driven company: SCYTHE. This is my personal site so I plan to use it to share the events I will be attending. As you know, […]
Had a great time catching up with Robert Rounsavall from Trapezoid on his podcast SYN-ACK FIN-ACK. We covered quiet a bit, here are some highlights: How I got into IT 3 years at Terremark Shifting to Information Security Working in Terremark’s SOC and the July 4, 2009 DDOS (https://en.wikipedia.org/wiki/July_2009_cyberattacks), Cloud Security pilot for USG/GSA, Meeting […]
Red Team Village Mayhem Presentation If you know me, you know I’ve always wanted to speak at Blackhat and DEF CON. This year will be different with DEF CON in Safe Mode but since I submitted talks, the folks at Red Team Village reached out to see if I would present at Red Team Mayhem […]
Some of you may be wondering, at the primary level, what role a penetration tester—aka, a “pentester”—plays in the grand scheme of information security; what do these folks do on a day-to-day basis that makes the job so important and so cool? Others may have already done some research on the role, understanding what’s involved, […]
I met Gerald Auger at GRIMMCon as we were both volunteering to run the free, virtual conference. We spent some time chatting about various things and he invited me on his project Simply Cyber.
In this video, I interview Jorge Orchilles on a variety of cybersecurity topics rooted in his experience. Grab a cup a coffee and settle in, as Jorge takes us through the challenges and benefits of working in the financial services sector, how to get started in cybersecurity how cloud computing has evolved, and the developing state of red, blue, and purple teams.
Hope you enjoy!
Had a great time chatting up with Douglas A. Brush from Cyber Security Interviews. We covered hiring in information security, what I look for as a hiring manager (passion), and how to retain top talent. Hope you enjoy!
As I have spent some time researching and developing a WP8 application security testing methodology and process, I have come up with three key security features that are missing from Microsoft’s Windows Phone 8. From an offensive security perspective, these feature are good to have for testing but from an end user perspective, they are […]
By now you should be familiar with the WP8 app you are testing and need to see the type of traffic it is sending to transmit data to the Internet. This post will show you how to use an HTTP proxy, configure it on the WP8 device, and install a digital certificate to see HTTPS […]